Encrypting File System

Results: 204



#Item
111Computing / Cryptographic software / Antivirus software / ESET NOD32 / ESET / Advanced Encryption Standard / Data security / USB flash drive / Encrypting File System / Disk encryption / Cryptography / Software

DESlock+ Compliance Guide Protect your data Health Insurance Portability and Accountability (HIPAA). This act was enacted by the United States Congress in 1996 and as of September 23, 2013,

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2014-06-10 13:37:18
112Internet Explorer / Windows XP / Windows Vista / Remote desktop / Federal Desktop Core Configuration / Encrypting File System / Group Policy / Windows Registry / Windows / Microsoft Windows / Software / System software

FDCC Implementers Workshop David L. Dixon Sr. Consultant, Microsoft Federal Services FDCC Team 

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
113Computer security / Lightweight Portable Security / Crypt / Passphrase / Zip / Encryption / Encrypting File System / Filesystem-level encryption / Cryptographic software / Disk encryption / Cryptography

INFORMATION SERVICES MANAGEMENT CENTER (UIS)

Add to Reading List

Source URL: www.usuhs.mil

Language: English - Date: 2014-11-17 14:34:36
114System software / Computing / Filesystem-level encryption / Encryption software / Encryption / USB flash drive / Private Disk / Encrypting File System / Disk encryption / Cryptographic software / Software

Microsoft Word - CSG-03_G_english.DOC

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-03 07:40:52
115Privacy Office of the U.S. Department of Homeland Security / United States Department of Homeland Security / Information privacy / Internet privacy / Medical privacy / Backup / Electronic Filing System / Encrypting File System / Ethics / Privacy / Data security

Department of the Interior

Add to Reading List

Source URL: www.doi.gov

Language: English - Date: 2014-09-16 11:29:13
116System software / Computing / Encryption / BitLocker Drive Encryption / Encrypting File System / Disk encryption / Cryptographic software / Software

WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS ........................................ How Endpoint Encryption Works Who should read this paper

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2014-11-12 11:43:42
117System software / Software / Apache Hadoop / Kerberos / Encrypting File System / Filesystem-level encryption / Cryptographic software / Disk encryption / Computing

HDFS-6134 Data at Rest Encryption Transparent Encryption Support Introduction   There are several different layers in the (traditional) stack where encryption can be applied: 

Add to Reading List

Source URL: issues.apache.org

Language: English
118Disk encryption / Cryptographic software / Cryptography / Apache Hadoop / Cloud computing / Cloud infrastructure / Filesystem in Userspace / Encryption / Encrypting File System / Software / Computing / System software

Data at Rest Encryption Test Plan  Overview    This test plan focuses on testing data at rest encryption (HDFS­6134) with the Hadoop Key  Management Server (HADOOP­10433).   

Add to Reading List

Source URL: issues.apache.org

Language: English
119Windows NT / Windows Vista / Cryptographic software / Windows Server / Windows / BitLocker Drive Encryption / Encrypting File System / Internet Explorer / Features new to Windows 7 / Microsoft Windows / Software / Computer architecture

Windows® 8.1 Security New and Improved Windows® 8.1 Security—New and Improved Contents

Add to Reading List

Source URL: static1.esetstatic.com

Language: English - Date: 2014-03-31 10:01:52
120Relational database management systems / Microsoft SQL Server / Transparent Data Encryption / Windows Server / NTFS / Windows / C-treeACE / Encrypting File System / Microsoft Windows / Software / Data management

Product Overview Encryptionizer® DE NetLib® Encryptionizer® DE (Desktop Edition) can be integrated into an application to add an additional layer of security separate from Windows security and the application’s sec

Add to Reading List

Source URL: www.netlib.com

Language: English - Date: 2011-12-09 13:14:16
UPDATE